Justin Richer
|
c21607dcbe
|
fixed hmac unit test after signature base string was fixed in underlying code
|
2012-04-09 10:48:02 -04:00 |
nemonik
|
6c8661f3ad
|
the signature base created in the verify method of the AbstractJwtSigner did not match how the Jwt.getSignatureBase creates the signature base. also, modified the testGenerateHmacSignature to exercise
|
2012-04-02 22:12:03 -04:00 |
nemonik
|
267f1b2de3
|
bas64 decoded signature prior to verifying, modified unit rsa unit test, and fixed ecdsa signer verify
|
2012-04-02 21:32:42 -04:00 |
Justin Richer
|
985a4619fa
|
abstracted keystore loader to new function
|
2012-04-02 15:06:58 -04:00 |
Justin Richer
|
3dfe6df410
|
refactored algorithms out to their own separate Enum
|
2012-04-02 13:13:13 -04:00 |
Justin Richer
|
fec6a3a876
|
removed definition parsers, may be picked up again later
|
2012-04-02 12:40:53 -04:00 |
Amanda Anganes
|
b986b30695
|
Fixed unit tests - they were broken due to an error in application-context.xml; not because of the refactor. App context was trying to instantiate an Hmac signer with name "HMACSHA256", which should have been "HS256". I updated the exceptions thrown by the signer impls so that if an Algorithm name mismatch occurs it will tell you what it is trying to match against.
|
2012-03-30 13:45:04 -04:00 |
nemonik
|
0a29eba617
|
unit test correction, slight refactor of tested classes
|
2012-03-29 14:02:51 -04:00 |
nemonik
|
1209e9a83f
|
fix to JwtTest unit test
|
2012-03-29 12:54:03 -04:00 |
nemonik
|
f215cfc50c
|
fix for issue 5, code refactoring across signers
|
2012-03-29 12:34:51 -04:00 |
nemonik
|
4f407a3a11
|
added rsa1024 key to keystore
|
2012-03-28 18:02:03 -04:00 |
Stephen Moore
|
1a1ae4c5b5
|
Removed Replacer plugin
|
2012-03-23 15:55:30 -04:00 |
Amanda Anganes
|
c50f968748
|
Merged to use idToken.setNonce().
|
2012-03-23 11:11:38 -04:00 |
Amanda Anganes
|
268b82e31d
|
Merge branch 'Branch_master3-23-2012'
|
2012-03-23 11:09:27 -04:00 |
Amanda Anganes
|
8b10b83516
|
Added setNonce to JwtClaims.
|
2012-03-23 11:08:49 -04:00 |
Justin Richer
|
34f24deb3e
|
Merge branch 'mitreaccounts'
|
2012-03-23 10:52:36 -04:00 |
Justin Richer
|
4a15e51e12
|
pass through nonce
|
2012-03-23 10:52:04 -04:00 |
Justin Richer
|
6c3552ebfa
|
changed mitre account names
|
2012-03-23 10:37:58 -04:00 |
U-MITRE\mjwalsh
|
b4836a0302
|
mods to auth filter including config comments, http socket time out...
|
2012-03-22 17:49:30 -04:00 |
Amanda Anganes
|
27fe3c9eca
|
Implemented signing. Works, but validation does not fail if you remove the signature.
|
2012-03-22 14:49:02 -04:00 |
Amanda Anganes
|
68c8d1a9d2
|
Changed parameter for check id endpoint to access_token instead of auth_token
|
2012-03-22 14:19:45 -04:00 |
Justin Richer
|
826be5a1a1
|
changed parameter name to match spec change
|
2012-03-22 14:10:50 -04:00 |
Justin Richer
|
5fe036878a
|
fixed view for idtoken in checkid endpoint
|
2012-03-22 14:09:25 -04:00 |
Justin Richer
|
c51bb72fe5
|
merged keystore changes
|
2012-03-22 13:50:47 -04:00 |
Justin Richer
|
6c01134095
|
JWK display support for key maps, still no key ids
|
2012-03-22 13:48:16 -04:00 |
Amanda Anganes
|
776748f908
|
Merge branch '3-22-2012'
|
2012-03-22 13:43:59 -04:00 |
Amanda Anganes
|
ae9b5e792a
|
Added a ConfigurationPropertiesBean.java to hold configuration properties. Fixed up CheckIDEndpoint.java a bit - it works, but is outputting the wrong thing.
|
2012-03-22 13:43:30 -04:00 |
Justin Richer
|
d5e7000365
|
disabled custom namespace parsers for keystores
|
2012-03-22 13:39:51 -04:00 |
Justin Richer
|
524a8e153e
|
signers turned into a map
|
2012-03-22 13:37:21 -04:00 |
Justin Richer
|
664dd1df46
|
JWT claims can now have nulls in them without barfing
|
2012-03-22 11:46:48 -04:00 |
Justin Richer
|
c59d3fe963
|
it spits out JWTs! and id tokens! JWT still needs to handle nulls
|
2012-03-21 17:59:48 -04:00 |
Amanda Anganes
|
ebe72412fe
|
Authorization Grant flow works up to serializing the returned Access Token. Justin is investigating serialization problems.
|
2012-03-21 16:44:16 -04:00 |
Amanda Anganes
|
d94eb338ee
|
Auth code flow works through user approval page. Current problem is that it doesn't seem to be matching up auth codes correctly (I keep getting "invalid code" error). But, it looks like it's going through our custom token granter so that is good.
|
2012-03-20 15:07:18 -04:00 |
Justin Richer
|
8263ce0dd5
|
added external class to persistence context
|
2012-03-16 17:01:24 -04:00 |
Justin Richer
|
b463cabc69
|
fixed configuration, moved sql file
|
2012-03-16 16:46:46 -04:00 |
Justin Richer
|
2f29cc52b2
|
Merge branch 'client_refactor'
|
2012-03-16 16:28:51 -04:00 |
Justin Richer
|
baf7c1c166
|
fixed dependencies and project configurations
|
2012-03-16 16:18:33 -04:00 |
Justin Richer
|
e6e7504213
|
added files and shuffled things to new packages
|
2012-03-16 15:46:23 -04:00 |
Justin Richer
|
a0cdd8bf2f
|
moved server to new package location
|
2012-03-16 15:01:53 -04:00 |